|Title||libtasn1-3 security update|
|Name||DSA-2440||First vendor Publication||2012-03-24|
|Vendor||Debian||Last vendor Modification||2012-03-24|
Security-Database Scoring CVSS v2
|Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)|
|Cvss Base Score||5||Attack Range||Network|
|Cvss Impact Score||2.9||Attack Complexity||Low|
|Cvss Expoit Score||10||Authentification||None Required|
|Calculate full CVSS 2.0 Vectors scores|
Matthew Hall discovered that many callers of the asn1_get_length_der function did not check the result against the overall buffer length before processing it further. This could result in out-of-bounds memory accesses and application crashes. Applications using GNUTLS are exposed to this issue.
For the stable distribution (squeeze), this problem has been fixed in version 2.7-1+squeeze+1.
For the unstable distribution (sid), this problem has been fixed in version 2.12-1.
We recommend that you upgrade your libtasn1-3 packages.
|Url : http://www.debian.org/security/2012/dsa-2440|
CWE : Common Weakness Enumeration